De-authing clients and capturing traffic perhaps? (Not actual data traffic unless you have a rogue cellphone able to connect to the network, a weak wireless network, or a rogue Wireless AP that the cellphones can be tricked into using by jamming the frequence of the other.) Just an idea ;D Have you separated the mobile cellphones from the critical infrastructure too? ;D

I guess in a case with a malicious app, it could be possible. Eventually / in time, it's likely that it can happen on any mobile platform :)

But that's just my thoughts, you're probably as secure as you can be, for now ;)

Last edited by MaXe on Thu Jan 26, 2012 11:10 am, edited 1 time in total.

I would say treat any device you cannot control as possibly hostile. If people want to connect their phones to the wireless network, put them on a segmented "public" wireless network or guest. If their phone does get compromised, then you do not risk access to the business infrastructure. Also if you are running iPhones then it might be a good idea (if you aren't already using or migrating to it) to use Exchange 2010 and utilize the iPhone feature to remotely wipe the device. That is if you allow them to connect their phones to the corporate network. Or just standardize and move everyone to BBs. I hate them but they make central management of mobile phones easy.

But yes you should be concerned since the phone is attached to two networks, yours and the mobile provider. You cannot control the mobile provider's network so treat it as hostile.